It seems this great tool has been lost to internet backlog somewhere. I cannot locate it anywhere. The description of tools provided is
http://www.securityfocus.com/tools/category/112
If someone on ...

I am working in a Virtual Machine that is on a ESXi server on a remote machine. I am not the only one who has access to the ESXi and others could take memory snapshots of my running VM. Is there a way ...

My home / home-office network uses OpenDNS as a content filter. As the OpenDNS admin, I received a "User wants access to..." email indicating that someone tried to access a blocked site and requested ...

What is the best course of action when you discover that a non-administrator Linux account has gotten owned, and a single foreign process is running, making all sorts of networking connections?
For ...

I would think the answer is unequivocally, "No." But...
My MacBook Pro logged "Diagnostic and Usage Messages" in the Console, at 4:19am, while it was physically closed and (therefore) sleeping. I was ...

Suppose I have both network based IDS and host based IDS installed in my environment, will I miss any security attacks if I don't correlate the information from these sources? If so, what are they?
It ...

When using the Windows Azure IAAS servers how does one setup IPS for all incoming traffic to these servers? How would a regular user who runs his whole environment within Azure make sure that he can ...

I am curious in general if there are any reporting that collects statistics about the security breaches? like per country per industry and revenue losses?
I am not interested in anonymized breaches ...

Are there any industry accepted standards for the false positive rates for a Network IDS based on Snort? Is there a way to check the false positive rates in a deployed IDS? (ideally without looking at ...

Recently I put some hidden links in a web site in order to trap web crawlers. (Used CSS visibility hidden style in order to avoid human users accessing it).
Any way, I found that there were plenty of ...

Could my computer be compromised if someone knew my external IP? I know that when you type that in it just goes into the router page, but my computer is connected to said router.
If so, what is the ...

Most of the time, when an intruder is detected, we would disconnect it at once. However there are certain cases where the intruder is not disconnected.
What are the benefits of not disconnecting the ...

I need to go through airport security and customs, and its known that at least the German customs (http://en.wiktionary.org/wiki/Bundestrojaner) (and I suspect others as well) try to upload software ...

As far as I have read and understood STAT is a concept used to design a platform independent IDS.
My doubt is whether there exists any compiler/interpreter for STAT Language as I am planning to do a ...

I want to check my network intrusion detection system (physical intrusion like unauthorized gadgets or devices in wifi/ethernet). Until now everything is ok, but I was wondering if I block every query ...

I'm not sure if this is the right site to ask, so I apologise if it isn't, but here goes.
A while ago I started noticing some odd behaviour. My Gmail account was compromised, it seemed, and I had to ...

I'm a very security conscious (bordering paranoia) freelance web developer and I place a lot of emphasis on security with my clients, alas I've found this doesn't seem to be the case for the average ...

I am sharing a DropBox Folder with by Friends for a project so that we can be updated with each other progress. But i was not very convince after reading the How secure is Dropbox?. What if one of my ...

I am suspecting someone unauthorized is trying to or already in the network trying to get information on some data that we have. How can I lure this person to a "Honeypot" and gather information while ...

I am using a linksys router with DD-WRT firmware with a WiBro internet connection, the ISP uses a hub with multiple user connected to it. The issue is that an unidentified MAC address seems to pop up ...

According to news articles (eg here) the 2013 National Defense Authorization Act, which was signed into US law 2-Jan-2012, apparently requires defense contractors to report intrusions. What defines a ...